Security isn’t just a checkbox; it’s the foundation of your customer’s trust. This guide covers essential Salesforce security measures for 2026, from mandatory MFA and Health Checks to the modern shift from Profiles to Permission Sets.
Index / Table of Contents
- Introduction
- The Absolute Basics: MFA & Health Check
- Access Control: The Shift to Permission Sets
- Advanced Defense: Salesforce Shield
- Session Security: Locking the Door
- Common Security Mistakes
- Conclusion
Introduction
“Trust” is Salesforce’s number one value for a reason. If your data isn’t secure, your fancy automation and clean data won’t matter.
In 2025, security threats are more sophisticated, but so are the tools Salesforce provides to stop them. Unfortunately, many orgs are still running on default settings from five years ago. This guide cuts through the noise and outlines the practical steps you need to take now to lock down your Salesforce environment without locking out your users.
The Absolute Basics: MFA & Health Check
If you do nothing else today, do these two things.
1. Multi-Factor Authentication (MFA)
By now, this should be non-negotiable. Salesforce contractually requires MFA for all internal users.
- Why: Passwords are easy to steal. A physical device (like a phone) is not.
- Best Practice: Don’t just turn it on; monitor it. Use the “Identity Verification History” to ensure users aren’t bypassing it.
- Tip: Use the Salesforce Authenticator app for the smoothest user experience (one-tap approval), but support standard TOTP apps (like Google Authenticator) for flexibility.
2. Security Health Check
Think of this as your credit score, but for Salesforce security.
- Where to find it: Setup > Security > Health Check.
- The Goal: You want a score of 90% or higher.
- What it does: It compares your org’s settings against Salesforce’s baseline standard. It will flag things like “Password expires in 90 days” or “Maximum invalid login attempts.”
- Action: Click “Fix Risks” to instantly update settings to the recommended standard. It’s the quickest win you will ever get.
Access Control: The Shift to Permission Sets
The “Old Way” of managing user access (stuffing everything into Profiles) is dying. The “New Way” is the Principle of Least Privilege.
Profiles vs. Permission Sets
- Profiles: Use them only for defaults (Page Layouts, Login Hours, IP Ranges). Give users a “Minimum Access” profile.
- Permission Sets: Use these to grant actual access (Objects, Fields, Apps).
- Permission Set Groups: This is the game-changer. Bundle multiple permission sets together based on a job role (e.g., “Sales Manager Group” includes “Export Reports,” “Delete Leads,” and “View Dashboard”).
Why switch? If a user changes roles, you simply remove the Permission Set Group. You don’t have to clone a massive Profile and edit 500 settings.
Advanced Defense: Salesforce Shield
For regulated industries (Healthcare, Finance) or anyone paranoid about data leaks, Salesforce Shield is the premium armor. It has three main pillars:
- Platform Encryption:
- Unlike “Classic Encryption” (which just masks fields), this encrypts data at rest in the database.
- Even if someone physically stole the hard drive from a Salesforce data center, they couldn’t read your “Social Security Number” field without the key.
- Event Monitoring:
- This is your CCTV camera. It logs everything.
- Scenario: A sales rep downloads a report of 5,000 leads right before quitting. Standard Salesforce won’t alert you. Event Monitoring will.
- Field Audit Trail:
- Standard history tracking lasts 18-24 months. Shield extends this to 10 years. Essential for legal compliance.
Session Security: Locking the Door
Even if a hacker steals a session ID (cookie), strict session settings can stop them.
Go to Setup > Session Settings:
- Timeout Value: Default is often 2 hours. Change this to 15 or 30 minutes for sensitive orgs. If a user walks away for lunch, their screen should lock.
- Lock sessions to the IP address: Ensure that if a session starts on one IP, it cannot be used from another. This kills “Session Hijacking” attacks instantly.
- Require HttpOnly attribute: Prevents client-side scripts (XSS attacks) from accessing the cookie.
Common Security Mistakes
- The “Super Admin” Problem: Giving “System Administrator” profiles to developers or power users just because “it’s easier.” Don’t. Use the “View All Data” permission in a specialized Permission Set instead.
- Ignoring Sandbox Security: Production is secure, but is your Full Sandbox? It has a copy of real customer data. Ensure masking scripts run after a refresh, or enforce the same security rules in Sandbox.
- Open Guest User Access: If you have Experience Cloud (Community) sites, check your “Guest User” profile. Ensure they cannot edit or delete records. This is a common vector for data leaks.
Conclusion
Salesforce security is not a one-time setup; it is a habit. Features like Health Check make it easy to audit yourself, but the mindset shift to “Least Privilege” (using Permission Sets) is what will truly protect your data in the long run.
Take 15 minutes today to run a Health Check. It might just save you a massive headache tomorrow.
